{"id":4195,"date":"2021-12-01T10:20:00","date_gmt":"2021-12-01T09:20:00","guid":{"rendered":"https:\/\/grupoloyal.net\/curso-security-in-google-cloud\/"},"modified":"2021-12-01T10:20:00","modified_gmt":"2021-12-01T09:20:00","slug":"curso-security-in-google-cloud","status":"publish","type":"post","link":"https:\/\/grupoloyal.net\/curso-security-in-google-cloud\/","title":{"rendered":"Security in Google Cloud"},"content":{"rendered":"

[et_pb_section fb_built=\u00bb1″ fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][et_pb_fullwidth_image src=\u00bbhttps:\/\/grupoloyal.net\/wp-content\/uploads\/2022\/02\/curso-e1645533395126.jpg\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ min_height=\u00bb223.3px\u00bb height=\u00bb530px\u00bb][\/et_pb_fullwidth_image][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ min_height=\u00bb106px\u00bb custom_padding=\u00bb12px||0px|||\u00bb background_color=\u00bb#eaeaea\u00bb hover_enabled=\u00bb0″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column _builder_version=\u00bb4.4.0″ type=\u00bb4_4″][et_pb_text _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Security in Google Cloud<\/h1>\n

This course gives participants broad study of security controls and techniques on Google Cloud. Through lectures, demonstrations, and hands-on labs, participants explore and deploy
\nthe components of a secure GCP solution. Participants also learn mitigation techniques for attacks at many points in a GCP-based infrastructure, including Distributed Denial-of-Service
\nattacks, phishing attacks, and threats involving content classification and use.
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_padding=\u00bb52px|||||\u00bb][et_pb_row column_structure=\u00bb3_5,2_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_blurb title=\u00bbObjetivos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-objetivos.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ header_font_size=\u00bb19px\u00bb]
\nThis course teaches participants the following skills:
\n\u25cf Understanding the Google approach to security
\n\u25cf Managing administrative identities using Cloud Identity.
\n\u25cf Implementing least privilege administrative access using Google Cloud Resource
\nManager, Cloud IAM.
\n\u25cf Implementing IP traffic controls using VPC firewalls and Cloud Armor
\n\u25cf Implementing Identity Aware Proxy
\n\u25cf Analyzing changes to the configuration or metadata of resources with GCP audit logs
\n\u25cf Scanning for and redact sensitive data with the Data Loss Prevention API
\n\u25cf Scanning a GCP deployment with Forseti
\n\u25cf Remediating important types of vulnerabilities, especially in public access to data and
\nVMs
\n[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.4.0″][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-palabras-clave-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Cloud computing<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-elearning-300×194.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato e-learning<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-presencial.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato presencial<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato a distancia<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Acceso al campus<\/strong><\/a><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-subvencionado-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Subvenci\u00f3n disponible<\/strong>
\nA trav\u00e9s de Fundae, cumpliendo requisitos.<\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-duracion-1-290×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Duraci\u00f3n<\/strong>
\n15 horas<\/p>\n

[\/et_pb_blurb][et_pb_counters _builder_version=\u00bb4.4.0″][et_pb_counter percent=\u00bb50″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Dificultad[\/et_pb_counter][et_pb_counter percent=\u00bb80″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Nivel alcanzado[\/et_pb_counter][\/et_pb_counters][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#eeeeee\u00bb min_height=\u00bb194px\u00bb custom_padding=\u00bb17px||19px|||\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbDirigido a\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-dirigido-a-300×268.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n

This class is intended for the following job roles:
\n\u25cf Cloud information security analysts, architects, and engineers
\n\u25cf Information security\/cybersecurity specialists
\n\u25cf Cloud infrastructure architects
\n\u25cf Developers of cloud applications<\/p>\n<\/div>\n<\/div>\n

\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbConocimientos requeridos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-skils.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ custom_margin=\u00bb||-120px|||\u00bb child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n
\n

To get the most out of this course, participants should have:<\/p>\n

\u25cf Prior completion of Google Cloud Platform Fundamentals: Core Infrastructure or
\nequivalent experience
\n\u25cf Prior completion of Networking in Google Cloud Platform or equivalent experience
\n\u25cf Knowledge of foundational concepts in information security:
\n\u25cb Fundamental concepts:
\n\u25a0 vulnerability, threat, attack surface
\n\u25a0 confidentiality, integrity, availability
\nCommon threat types and their mitigation
\nstrategies<\/p>\n

\u25cb Public-key cryptography
\n\u25a0 Public and private key pairs
\n\u25a0 Certificates
\n\u25a0 Cipher types
\n\u25a0 Key width<\/p>\n

\u25cb Certificate authorities
\n\u25cb Transport Layer Security\/Secure Sockets Layer encrypted communication
\n\u25cb Public key infrastructures
\n\u25cb Security policy
\n\u25cf Basic proficiency with command-line tools and Linux operating system environments
\n\u25cf Systems Operations experience, including deploying and managing applications, either
\non-premises or in a public cloud environment
\n\u25cf Reading comprehension of code in Python or JavaScript\n<\/p><\/div>\n<\/div>\n

\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_margin=\u00bb1px|||||\u00bb][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″]
\n[et_pb_text content_tablet=\u00bb\u00bb]<\/p>\n

Temario<\/h2>\n

Module 1
\nFoundations of GCP
\nSecurity
\n\u25cf Understand the GCP shared security responsibility model
\n\u25cf Understand Google Cloud\u2019s approach to security
\n\u25cf Understand the kinds of threats mitigated by Google and by GCP
\n\u25cf Define and Understand Access Transparency and Access Approval
\n(beta)
\nModule 2
\nCloud Identity
\n\u25cf Cloud Identity
\n\u25cf Syncing with Microsoft Active Directory using Google Cloud Directory
\nSync
\n\u25cf Using Managed Service for Microsoft Active Directory (beta )
\n\u25cf Choosing between Google authentication and SAML-based SSO
\n\u25cf Best practices, including DNS configuration, super admin accounts
\n\u25cf Lab: Defining Users with Cloud Identity Console
\nModule 3
\nIdentity, Access, and Key
\nManagement
\n\u25cf GCP Resource Manager: projects, folders, and organizations
\n\u25cf GCP IAM roles, including custom roles
\n\u25cf GCP IAM policies, including organization policies
\n\u25cf GCP IAM Labels
\n\u25cf GCP IAM Recommender
\n\u25cf GCP IAM Troubleshooter
\n\u25cf GCP IAM Audit Logs
\n\u25cf Best practices, including separation of duties and least privilege, the
\nuse of Google groups in policies, and avoiding the use of primitive
\nroles
\n\u25cf Labs: Configuring Cloud IAM, including custom roles and organization
\npolicies
\nModule 4
\nConfiguring Google Virtual
\nPrivate Cloud for Isolation
\nand Security
\n\u25cf Configuring VPC firewalls (both ingress and egress rules)
\n\u25cf Load balancing and SSL policies
\n\u25cf Private Google API access
\n\u25cf SSL proxy use
\n\u25cf Best practices for VPC networks, including peering and shared VPC
\nuse, correct use of subnetworks
\n\u25cf Best security practices for VPNs
\n\u25cf Security considerations for interconnect and peering options
\n\u25cf Available security products from partners
\n\u25cf Defining a service perimeter, including perimeter bridges
\n\u25cf Setting up private connectivity to Google APIs and services
\n\u25cf Lab: Configuring VPC firewalls<\/p>\n

PART II: SECURITY BEST PRACTICES ON GOOGLE CLOUD<\/p>\n

Module 5
\nSecuring Compute Engine:
\ntechniques and best
\npractices
\n\u25cf Compute Engine service accounts, default and customer-defined
\n\u25cf IAM roles for VMs
\n\u25cf API scopes for VMs
\n\u25cf Managing SSH keys for Linux VMs
\n\u25cf Managing RDP logins for Windows VMs
\n\u25cf Organization policy controls: trusted images, public IP address,
\ndisabling serial port
\n\u25cf Encrypting VM images with customer-managed encryption keys and
\nwith customer-supplied encryption keys
\n\u25cf Finding and remediating public access to VMs
\n\u25cf Best practices, including using hardened custom images, custom
\nservice accounts (not the default service account), tailored API
\nscopes, and the use of application default credentials instead of
\nuser-managed keys
\n\u25cf Lab: Configuring, using, and auditing VM service accounts and scopes
\n\u25cf Encrypting VM disks with customer-supplied encryption keys
\n\u25cf Lab: Encrypting disks with customer-supplied encryption keys
\n\u25cf Using Shielded VMs to maintain the integrity of virtual machines
\nModule 6
\nSecuring cloud data:
\ntechniques and best
\npractices
\n\u25cf Cloud Storage and IAM permissions
\n\u25cf Cloud Storage and ACLs
\n\u25cf Auditing cloud data, including finding and remediating publicly
\naccessible data
\n\u25cf Signed Cloud Storage URLs
\n\u25cf Signed policy documents
\n\u25cf Encrypting Cloud Storage objects with customer-managed encryption
\nkeys and with customer-supplied encryption keys
\n\u25cf Best practices, including deleting archived versions of objects after
\nkey rotation
\n\u25cf Lab: Using customer-supplied encryption keys with Cloud Storage
\n\u25cf Lab: Using customer-managed encryption keys with Cloud Storage
\nand Cloud KMS
\n\u25cf BigQuery authorized views
\n\u25cf BigQuery IAM roles
\n\u25cf Best practices, including preferring IAM permissions over ACLs
\n\u25cf Lab: Creating a BigQuery authorized view
\nModule 7
\nSecuring Applications:
\ntechniques and best
\npractices
\n\u25cf Types of application security vulnerabilities
\n\u25cf DoS protections in App Engine and Cloud Functions
\n\u25cf Cloud Security Scanner
\n\u25cf Lab: Using Cloud Security Scanner to find vulnerabilities in an App
\nEngine application
\n\u25cf Identity Aware Proxy
\n\u25cf Lab: Configuring Identity Aware Proxy to protect a project
\nModule 8
\nSecuring Kubernetes:
\ntechniques and best
\npractices
\n\u25cf Authorization
\n\u25cf Securing Workloads
\n\u25cf Securing Clusters
\n\u25cf Logging and Monitoring<\/p>\n

PART III: MITIGATING VULNERABILITIES IN GOOGLE CLOUD<\/p>\n

Module 9
\nProtecting against
\nDistributed Denial of Service
\nAttacks
\n\u25cf How DDoS attacks work
\n\u25cf Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress
\nfirewalls, Cloud Armor (including its rules language)
\n\u25cf Types of complementary partner products
\n\u25cf Lab: Configuring GCLB, CDN, traffic blacklisting with Cloud Armor
\nModule 10
\nProtecting against
\ncontent-related
\nvulnerabilities
\n\u25cf Threat: Ransomware
\n\u25cf Mitigations: Backups, IAM, Data Loss Prevention API
\n\u25cf Threats: Data misuse, privacy violations,
\nsensitive\/restricted\/unacceptable content
\n\u25cf Threat: Identity and Oauth phishing
\n\u25cf Mitigations: Classifying content using Cloud ML APIs; scanning and
\nredacting data using Data Loss Prevention API
\n\u25cf Lab: Redacting Sensitive Data with Data Loss Prevention API
\nModule 11
\nMonitoring, Logging,
\nAuditing, and Scanning
\n\u25cf Security Command Center
\n\u25cf Stackdriver monitoring and logging
\n\u25cf Lab: Installing Stackdriver agents
\n\u25cf Lab: Configuring and using Stackdriver monitoring and logging
\n\u25cf VPC flow logs
\n\u25cf Lab: Viewing and using VPC flow logs in Stackdriver
\n\u25cf Cloud audit logging
\n\u25cf Lab: Configuring and viewing audit logs in Stackdriver
\n\u25cf Deploying and Using Forseti
\n\u25cf Lab: Inventorying a Deployment with Forseti Inventory (demo)
\n\u25cf Lab: Scanning a Deployment with Forseti Scanner (demo
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#032b35″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″][et_pb_contact_form captcha=\u00bboff\u00bb title=\u00bbSolicita informaci\u00f3n del curso\u00bb submit_button_text=\u00bbSolicitar informaci\u00f3n ahora\u00bb _builder_version=\u00bb4.4.0″ title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb30px\u00bb][et_pb_contact_field field_id=\u00bbName\u00bb field_title=\u00bbNombre\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmail\u00bb field_title=\u00bbDirecci\u00f3n de correo electr\u00f3nico\u00bb field_type=\u00bbemail\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmpresa\u00bb field_title=\u00bbEmpresa\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbMessage\u00bb field_title=\u00bbCu\u00e9ntanos un poco sobre tus necesidades\u00bb field_type=\u00bbtext\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″ form_field_text_color=\u00bb#555555″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

15 horas<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[53,9,11],"tags":[],"class_list":["post-4195","post","type-post","status-publish","format-standard","hentry","category-cloud-computing","category-cursos","category-cursos-de-it"],"acf":[],"_links":{"self":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/4195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/comments?post=4195"}],"version-history":[{"count":0,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/4195\/revisions"}],"wp:attachment":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/media?parent=4195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/categories?post=4195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/tags?post=4195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}